At the center of governance in Neostella is a simple principle: structure means nothing without control. Access is the system layer that defines how people enter, interact with, and operate inside Neostella.
Access is not a single configuration tool. It is a governance framework that creates users, organizes them into groups, defines their operational roles, applies permission sets, and tracks every structural identity change that occurs across the platform.
what the access tool is responsible for
Access is responsible for identity, authorization, and traceability across Neostella.
Every interaction in the system begins with a user identity. That identity must be structured, governed, and evaluated consistently. Access provides the framework that makes this possible.
Through Access, administrators define who belongs in the system, how they are organized, how they participate in projects, and what level of authority they hold across tools and records. Permissions are not applied randomly or managed module by module. They are structured centrally and evaluated dynamically every time a user interacts with the platform.
Access ensures that governance scales as the firm grows without fragmenting security or creating manual overhead.
how access works in practice
Access operates through a layered governance model that separates identity, participation, and authority.
A user is first established as a system identity. That identity becomes the anchor for every action the person will perform inside Neostella. From there, the user can be organized into groups that reflect the firm’s operational or structural organization. Within projects, the user may also hold defined roles that represent functional responsibility.
Authority, however, is not determined by role or group alone. It is enforced through Permission Sets. These permission frameworks define what actions are allowed across objects, tools, and administrative features. Each time a user opens a record, edits information, runs a workflow, or accesses a configuration area, the system evaluates their assigned permissions in real time.
This evaluation is automatic and consistent. Access does not rely on isolated settings scattered across the system. It applies a unified governance framework that ensures predictable enforcement across modules.
At the same time, Access maintains traceability. Structural changes to user identities, assignments, and governance configurations are captured through audit visibility tools.
In practice, Access transforms a collection of users into a structured, accountable operational environment.